Aims & Scope
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.
The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.
Dr. Stéphanie Delaune
Univ Rennes, CNRS, IRISA
Campus universitaire de Beaulieu
263 Avenue du Général Leclerc
35042 Rennes Cedex - France
Dr. Peng Liu
College of Information Sciences and Technology
Pennsylvania State University
330 Westgate, University Park
PA 16802, USA
Prof. Sushil Jajodia
Center for Secure Information Systems
George Mason University
Dr. Jonathan Millen
School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology Stockholm
Surrey Centre for Cyber Security, University of Surrey
University of Florida
Università Ca' Foscari Venezia
Sabrina De Capitani di Vimercati
Univ. degli Studi di Milano
University of Padova
National Institute for Research in Computer Science and Control, CIDRE Team Le Chesnay
University of Stuttgart
University of Science and Technology of China
INSA Toulouse - LAAS-CNRS
Max Planck Institute for Security and Privacy
Stony Brook Univ.
University of Delaware
Pennsylvania State University
George Mason University
ACM Computing Reviews
ACM Digital Library
Applied Science & Technology Source
Business Source Complete
Cabell's Guide or Directory
Cambridge Scientific Abstracts
Computer Science Index
DBLP Bibliography Server
Emerald Management Reviews
International Security & Counter-Terrorism Reference Center
Microsoft Academic Search
Science & Technology Collection
Ulrich's Periodicals Directory
Web of Science: BIOSIS Previews
Web of Science: Emerging Sources Citation Index
By default, articles published in the Journal of Computer Security are available only to institutions and individuals with access rights. However, the journal offers all authors the option to purchase open access publication for their article as part of the IOS Press Open Library. This means that the final published version will be freely available to anyone worldwide, indefinitely, under a Creative Commons license and without the need to purchase access to the article. This is also referred to as “gold” open access.
Gold open access pricing
Authors who choose gold open access publication will be subject to an article publication charge of € 1500 / US$ 1500 for publication under the CC BY-NC 4.0 license or € 2150 / US$ 2150 for publication under the CC BY 4.0 license. Pricing is exclusive of possible taxes. After an article is accepted for publication, the corresponding author will be informed regarding the open access option during the production stages, and will have the opportunity to purchase open access for their article. It could be that the open access fee of an article is waived completely due an institutional agreement IOS Press has with the corresponding authors' institution. Please check the institutional agreements page for details.
Green open access
Authors who do not make use of the gold open access option may still make their article freely available using self-archiving, also referred to as green open access. Authors may make their final accepted manuscript available for free download from their personal or institutional website or institutional archive. This model is free for the author.
Journal of Computer Security is a peer-reviewed journal. All articles submitted to the journal undergo a single blind peer review process. This means that the identity of the authors is known with the reviewers but the identity of the reviewers is not communicated to the authors. Please visit our reviewer guidelines for further information about how to conduct a review.
All submitted manuscripts are automatically screened for plagiarism through iThenticate. Each submitted article is pre-screened by the Editors-in-Chief to decide if it is suitable to be sent out for formal review. Reasons to reject a paper in the pre-screening process could for example be because the work does not fall within the aims and scope, the writing is of poor quality, the instructions to authors were not followed or the presented work is not novel.
Papers deemed suitable to be reviewed will be assigned a handling editor. The handling editor will then invite reviewers to comment on the work. Typically, a minimum of two reviews are required to be able make a decision on a paper.
Reviewers are asked to judge a paper on at least:
- Relevance to the journal
- Significance of results
- Depth of results
- Correctness of results
- Clarity of presentation
Based on the received reviews the handling editor will propose to the Editors-in-Chief their recommendation:
- Accept as is
- Accept Pending Minor Revisions
- Revise and Resubmit
- Reject Outright
For articles that receive a Revise and Resubmit decision, often major revisions are required and articles may still be rejected in a second round of peer review.
Accept or reject decisions are made by the Editors-in-Chief, whose decision is final.
Discover the contents of the latest journal issue:
Guest editors’ introduction
Haibing Lu, Shamik Sural
Securing blockchain-based timed data release against adversarial attacks1
Balaji Palanisamy, Jingzhe Wang
The intrinsic dimensionality of network datasets and its applications1
Caspian Siebert, Matt Gorbett, Hossein Shirazi, Indrakshi Ray
Con2Mix: A semi-supervised method for imbalanced tabular security data1
Latifur Khan, Xiaodi Li, Mahmoud Zamani, Shamila Wickramasuriya, Kevin Hamlen, Bhavani Thuraisingham